dmarc misconceptions

For a lot of people, it’s not immediately clear what DMARC does or how it prevents domain spoofing, impersonation and fraud. This can lead to serious misconceptions about DMARC, how email authentication works, and why it’s good for you. But how do you know what’s right and what’s wrong? And how can you be sure you’re implementing it correctly? 

PowerDMARC is here to the rescue! To help you understand DMARC better, we’ve compiled this list of the top 6 most common misconceptions about DMARC.

1. DMARC is the same as a spam filter

This is one of the most common things people get wrong about DMARC. Spam filters block incoming email that are delivered to your inbox. These can be suspicious emails sent from anyone’s domain, not just yours. DMARC, on the other hand, tells receiving email servers how to handle outgoing email sent from your domain. Spam filters like Microsoft Office 365 ATP don’t protect against such cyberattacks. If your domain is DMARC-enforced and the email fails authentication, the receiving server rejects it.

2. Once you set up DMARC, your email is safe forever

DMARC is one of the most advanced email authentication protocols out there, but that doesn’t mean it’s completely self-sufficient. You need to regularly monitor your DMARC reports to make sure emails from authorized sources are not being rejected. Even more importantly, you need to check for unauthorized senders abusing your domain. When you see an IP address making repeated attempts to spoof your email, you need to take action immediately and have them blacklisted or taken down.

3. DMARC will reduce my email deliverability

When you set up DMARC, it’s important to first set your policy to p=none. This means that all your emails still get delivered, but you’ll receive DMARC reports on whether they passed or failed authentication. If during this monitoring period you see your own emails failing DMARC, you can take action to solve the issues. Once all your authorized emails are getting validated correctly, you can enforce DMARC with a policy of p=quarantine or p=reject.

4. I don’t need to enforce DMARC (p=none is enough)

When you set up DMARC without enforcing it (policy of p=none), all emails from your domain—including those that fail DMARC—get delivered. You’ll be receiving DMARC reports but not protecting your domain from any spoofing attempts. After the initial monitoring period (explained above), it’s absolutely necessary to set your policy to p=quarantine or p=reject and enforce DMARC.

5. Only big brands need DMARC

Many smaller organizations believe that it’s only the biggest, most recognizable brands that need DMARC protection. In reality, cybercriminals will use any business domains to launch a spoofing attack. Many smaller businesses typically don’t have dedicated cybersecurity teams, which makes it even easier for attackers to target small and medium-size organizations. Remember, every organization that has a domain name needs DMARC protection!

6. DMARC Reports are easy to read

We see many organizations implementing DMARC and having the reports sent to their own email inboxes. The problem with this is that DMARC reports come in an XML file format, which can be very difficult to read if you’re not familiar with it. Using a dedicated DMARC platform can not only make your setup process much easier, but PowerDMARC can convert your complex XML files into easy to read reports with graphs, charts and in-depth stats.

 

new zealand spoofing risk

New Zealand’s top 200 companies and government departments are facing serious DMARC compliance issues, putting them at 36th spot worldwide.

In recent years, many major countries around the world have begun to recognize the importance of email security to prevent phishing attacks. In this climate of rapid change in cybersecurity practices, New Zealand has been lagging behind its peers in its levels of awareness and response to global security trends.

We conducted a study of 332 domains of organizations both in the public and private sectors. Among the domains we surveyed were:

  • Deloitte Top 200 List (2019)
  • New Zealand’s top energy companies
  • Top telecom companies
  • NZ registered banks
  • The New Zealand Government (excluding Crown entities).

By studying their public DNS records and gathering data on their SPF and DMARC statuses, we were able to gather data on how well-protected major New Zealand organizations are against spoofing. You can download our study to find out the details behind these numbers:

  • Only 37 domains, or 11%, had enforced DMARC at a level of quarantine or reject, which is required to stop domain spoofing.
  • Less than 30% of Government domains had implemented DMARC correctly at any level.
  • 14% of organizations observed had invalid SPF records and 4% had invalid DMARC records — many of them had errors in their records, and some even had multiple SPF and DMARC records for the same domain.

Our full study contains an in-depth exploration of the biggest hurdles New Zealand companies face in effectively implementing DMARC.

 

what is dmarc powerdmarc

One of the easiest ways to put yourself at risk of losing your data is to use email. No, seriously — the sheer number of businesses that face data breaches or get hacked because of an email phishing scam is staggering. So why do we still use email, then? Why not just use a more secure mode of communication that does the same job, only with better security?

It’s simple: email is incredibly convenient and everyone uses it. Pretty much every organization out there uses email either for communication or marketing. Email is integral to how business works. But the biggest flaw of email is something that’s unavoidable: it requires humans to interact with it. When people open emails, they read the contents, click on links, or even enter personal information. And because we don’t have the time or ability to carefully scrutinize every email, there’s a chance that one of them ends up being a phishing attack.

Attackers impersonate well-known, trusted brands to send emails to unsuspecting individuals. This is called domain spoofing. The recipients believe the messages to be genuine and click on malicious links or enter their login information, putting themselves at the attacker’s mercy. As long as these phishing emails continue entering people’s inboxes, email won’t be totally safe to use.

How Does DMARC Make Email Secure?

DMARC (Domain-based Message Authentication, Reporting and Conformance) is an email authentication protocol designed to combat domain spoofing. It uses two existing security protocols—SPF and DKIM—to protect users from receiving fraudulent email. When an organization sends email through their domain, the receiving email server checks their DNS for a DMARC record. The server then validates the email against SPF and DKIM. If the email successfully authenticates, it gets delivered to the destination inbox.

 

 Look up and generate records for DMARC, SPF, DKIM and more with Power Toolbox for free!

 

Only authorized senders are validated through SPF and DKIM, which means if someone tried to spoof their domain, the email would fail DMARC authentication. If that happens, the DMARC policy set by the domain owner tells the receiving server how to handle the email.

What is a DMARC Policy?

When implementing DMARC, the domain owner can set their DMARC policy, which tells the receiving email server what to do with an email that fails DMARC. There are 3 policies:

  • p=none
  • p=quarantine
  • p = reject

If your DMARC policy is set to none, even emails that don’t pass DMARC get delivered to the inbox. This is almost like not having a DMARC implementation at all. Your policy should only be set to none when you’re just setting up DMARC and want to monitor the activity in your domain.

Setting your DMARC policy to quarantine sends the email to the spam folder, while reject outright blocks the email from the receiver’s inbox. You need to have your DMARC policy set to either p=quarantine or p=reject in order to have full enforcement. Without enforcing DMARC, users receiving your emails will still receive emails from unauthorized senders spoofing your domain.

But all of this raises an important question. Why doesn’t everyone just use SPF and DKIM to verify their emails? Why bother with DMARC at all? The answer to that is…

DMARC Reporting

If there’s one key shortcoming of SPF and DKIM, it’s that they don’t give you feedback on how emails are being processed. When an email from your domain fails SPF or DKIM, there’s really no way to tell, and no way to fix the issue. If someone’s trying to spoof your domain, you wouldn’t even know about it.

accessible pdf records

That’s what makes DMARC’s reporting feature such a game-changer. DMARC generates weekly Aggregate Reports to the owner’s specified email address. These reports contain detailed information about which emails failed authentication, which IP addresses they were sent from, and lots more useful, actionable data. Having all this information can help the domain owner see which emails are failing to authenticate and why, and even identify spoofing attempts.

So far, it’s pretty clear that DMARC benefits email recipients by protecting them from unauthorized phishing emails. But it’s the domain owners that are implementing it. What advantage do organizations get when they deploy DMARC?

DMARC For Brand Safety

Although DMARC wasn’t created with this purpose, there’s one major advantage organizations stand to gain by implementing it: brand protection. When an attacker impersonates a brand to send malicious emails, they’re effectively co-opting the brand’s popularity and goodwill to peddle a scam. In a survey conducted by the IBID Group, 83% of customers said that they’re concerned about purchasing from a company that was previously breached.

The intangible elements of a transaction can often be as powerful as any hard data. Consumers put a lot of trust in the organizations they buy from, and if these brands become the face of a phishing scam, they stand to lose not only the customers who got phished, but many others who heard about it in the news. Brand safety is fragile, and must be guarded for the sake of the business and the customer.

 

There’s more to brand safety than just DMARC. BIMI lets users see your logo next to their emails! Check it out:

 

DMARC enables brands to take back control of who gets to send emails through their domain. By shutting out unauthorized senders from exploiting them, organizations can ensure only safe, legitimate emails go out to the public. This not only boosts their domain’s reputation with email providers, but it also goes a long way in ensuring a relationship built on trust and reliability between the brand and consumers.

DMARC: Making Email Safe for Everyone

DMARC’s purpose has always been greater than helping brands safeguard their domains. When everyone adopts DMARC, it creates an entire email ecosystem inoculated against phishing attacks. It works exactly like a vaccine — the more people that enforce the standard, the smaller the chances of everyone else falling prey to fake emails. With each domain that gets DMARC-protected, email as a whole becomes that much safer.

By making email safe for ourselves, we can help everyone else use it more freely. And we think that’s a standard worth upholding.

 

 

prevent emails from spoofing

Imagine you get to work one day, settle down at your desk, and open up your computer to check the news. Then you see it. Your organization’s name is all over the headlines — and it’s not good news. Someone launched an email spoofing attack from your domain, sending phishing emails to people all over the world. And many of them fell for it. Your company just became the face of a huge phishing attack, and now no one trusts your security or your emails.

This is exactly the situation that employees of the World Health Organization (WHO) found themselves in during the Covid-19 pandemic in February, 2020. Attackers were using the WHO’s actual domain name to send emails requesting people to donate to a coronavirus relief fund. This incident is hardly an isolated one, however. Countless organizations have fallen victim to very convincing phishing emails that innocuously ask for sensitive personal information, bank details or even login credentials. These can even be in the form of emails from within the same organization, casually asking for access to a database or company files.

As much as 90% of all data loss incidents have involved some element of phishing. And yet, domain spoofing isn’t even particularly complex to pull off. So why is it able to do so much damage?

How Does Domain Spoofing Work?

Domain spoofing attacks are pretty simple to understand.

  • The attacker forges the email header to include your organization’s name and sends fake phishing emails out to someone, using your brand name so they trust you.
  • People click on malicious links or give away sensitive information thinking it’s your organization asking for them.
  • When they realize it’s a scam, your brand image takes a hit, and customers will lose trust in you

 

You’re exposing people outside (and inside) your organization to phishing emails. Even worse, malicious emails sent from your domain could really hurt your brand reputation in the eyes of customers.

So what can you do about this? How can you defend yourself and your brand against domain spoofing, and avert a PR disaster? Here are X ways you can avoid email spoofing:

1. Optimize Your SPF Record

One of the biggest mistakes with SPF is not keeping it concise. SPF records have a limit of 10 DNS Lookups to keep the cost of processing each email as low as possible. This means that simply including multiple IP addresses in your record could make you exceed your limit. If that happens, your SPF implementation becomes invalid and your email fails SPF and might not get delivered. Don’t let that happen: keep your SPF record short and sweet.

2. Keep Your List of Approved IPs up-to-date

If your organization uses multiple third party vendors approved to send email from your domain, this is for you. If you discontinue your services with one of them, you need to make sure you update your SPF record, too. If the vendor’s email system is compromised, someone might be able to use it to send ‘approved’ phishing emails from your domain! Always make sure only third party vendors still working with you have their IPs on your SPF record.

3. Implement DKIM

DomainKeys Identified Mail, or DKIM, is a protocol that gives every email sent from your domain a digital signature. This allows the receiving email server to validate if the email is genuine, and if it’s been modified during transit. If the email has been tampered with, the signature doesn’t get validated and the email fails DKIM. If you want to preserve the integrity of your data, get DKIM set up on your domain!

4. Set The Right DMARC Policy

Far too often, an organization implements DMARC but forgets the most important thing — actually enforcing it. DMARC policies can be set to one of three things: none, quarantine, and reject. When you set up DMARC, having your policy set to none means even email that fails authentication gets delivered. Implementing DMARC is a good first step, but without enforcing it, the protocol is ineffective. Instead, you should preferably set your policy to reject, so emails that don’t pass DMARC are automatically blocked. It’s important to note that email providers determine the reputation of a domain name when receiving an email. If your domain has a history of spoofing attacks associated with it, your reputation goes down. Consequently, your deliverability takes a hit too.

5. Upload Your Brand Logo To BIMI 

Brand Indicators for Message Identification, or BIMI, is a email security standard that uses brand logos to authenticate email. BIMI attaches your logo as an icon next to all your emails, making it instantly recognizable in someone’s inbox. If an attacker were to send an email from your domain, their email wouldn’t have your logo next to it. So even if the email got delivered, the chances of your customers recognizing a fake email would be much higher. But BIMI’s advantage is twofold. Every time someone receives an email from you, they see your logo and immediately associate you with the product or service your offer. So not only does it help your organization avoid email spoofing, it actually boosts your brand recognition.

 

Phishing Blog banner

Email phishing has evolved over the years from gamers sending prank emails to it becoming a highly lucrative activity for hackers across the world.

In fact, in the early to mid-’90s AOL experienced some of the first big email phishing attacks. Random credit card generators were used to steal user credentials which allowed hackers to gain wider access into AOL’s company-wide database.

These attacks were shut down as AOL upgraded their security systems to prevent further damage. This then led hackers to develop more sophisticated attacks using impersonation tactics which are still widely used today.

If we jump forward to today, the impersonation attacks most recently affecting both the White House and the WHO prove that any entity is at some point or another is vulnerable to email attacks.

According to Verizon’s 2019 Data Breach Investigation Report, approximately 32% of data breaches experienced in 2019 included email phishing and social engineering respectively.

With that in mind, we’re going to take a look at the different types of phishing attacks and why they pose a huge threat to your business today.

Let’s get started.

1. Email spoofing

Email spoofing attacks are when a hacker forges an email header and sender address to make it look like the email has come from someone they trust. The purpose of an attack like this is to coax the recipient into opening the mail and possibly even clicking on a link or beginning a dialogue with the attacker

These attacks rely heavily on social engineering techniques as opposed to using traditional hacking methods.

This may seem a rather unsophisticated or ‘low-tech’ approach to a cyberattack. In reality, though, they’re extremely effective at luring people through convincing emails sent to unsuspecting employees. Social engineering takes advantage not of the flaws in a system’s security infrastructure, but in the inevitability of human error.

Take a look:

In September 2019, Toyota lost $37 million to an email scam.

The hackers were able to spoof an email address and convince an employee with financial authority to alter account information for an electronic funds transfer.

Resulting in a massive loss to the company.

2. Business Email Compromise (BEC)

According to the FBI’s 2019 Internet Crime Report, BEC scams resulted in over $1.7 million and accounted for more than half cybercrime losses experienced in 2019.

BEC is when an attacker gains access to a business email account and is used to impersonate the owner of that account for the purposes of causing damage to a company and its employees.

This is because BEC is a very lucrative form of email attack, it produces high returns for attackers and which is why it remains a popular cyber threat.

A town in Colorado lost over $1 million to a BEC scam.

The attacker filled out a form on the local website where they requested a local construction company to receive electronic payments instead of receiving the usual checks for work they were currently doing in the town.

An employee accepted the form and updated the payment information and as a result sent over a million dollars to the attackers.

3. Vendor Email Compromise (VEC)

In September 2019, Nikkei Inc. Japan’s largest media organisation lost $29 million.

An employee based in Nikkei’s American office transferred the money on instruction from the scammers who impersonated a Management Executive.

A VEC attack is a type of email scam that compromises employees at a vendor company. Such as our above example. And, of course, resulted in huge financial losses for the business.

What about DMARC?

Businesses the world over are increasing their cybersecurity budgets to limit the examples we’ve listed above. According to IDC global spending on security solutions is forecasted to reach $133.7 billion in 2022.

But the truth of the matter is that the uptake of email security solutions like DMARC is slow.

DMARC technology arrived on the scene in 2011 and is effective in preventing targeted BEC attacks, which as we know are a proven threat to businesses all over the world.

DMARC works with both SPF and DKIM which allows you to determine which actions should be taken against unauthenticated emails to protect the integrity of your domain.

READ: What is DMARC and why your business needs to get on board today?

Each of the above cases had something in common… Visibility.

This technology can reduce the impact email phishing activity can have on your business. Here’s how:

  • Increased visibility. DMARC technology sends reports to provide you with detailed insight into the email activity across your business. PowerDMARC uses a powerful Threat Intelligence engine which helps produce real-time alerts of spoofing attacks. This is coupled with full reporting, allowing your business greater insight into a user’s historical records.
  • Increased email security. You will be able to track your company’s emails for any spoofing and phishing threats. We believe the key to prevention is the ability to act quickly, therefore, PowerDMARC has 24/7 security ops centers in place. They have the ability to pull down domains abusing your email immediately, offering your business an increased level of security.
    The globe is in the throes of the COVID-19 pandemic, but this has only provided widespread opportunity for hackers to take advantage of vulnerable security systems.

The recent impersonation attacks on both the White House and the WHO really highlight the need for greater use of DMARC technology.

 

In light of the COVID-19 pandemic and the rise in email phishing, we want to offer you 3 months FREE DMARC protection. Simply click the button below to get started right now 👇

 

 

What is DMARC and why your business needs to get on board

According to the 2019 Cost of Data Breach Report, from Ponemon Institute and IBM Security, the global average cost of a data breach is $3.92 million!

This cyberattack business is a lucrative one. 

In fact, Business Email Compromise generates higher ROI than any other cyberattack. According to the 2019 Internet Crime Report, it reported losses of over $1.7 billion. 

Cybersecurity measures and protocols are crucial to business continuity now more than ever.

According to the Verizon 2019 Data Breach Investigations Report, 94% of malware was delivered by email.

Enter Domain-based Message Authentication, Reporting, and Conformance (DMARC). 

Yes, it’s quite a mouthful. But the time to protect your business email is now.

What is DMARC? DMARC is a relatively new technology.  It’s a technical validation policy that’s set to help protect email senders and receivers from all email spam.

dmarc illustration| DMARC,DKIM,SPF

DMARC is a solution that builds on both the Sender Policy Framework (SPF) and Domain Key Identified Mail (DKIM) solutions. This technology allows your organisation to publish a specific security policy around your email authentication processes and then instructs your mail server on how to enforce them.

 

DMARC has three main policy settings: 

  • Monitor policy – p=none. This policy means that no action will be taken in the light of failing the DMARC checks.
  • Quarantine policy – p=quarantine. This policy means that all emails that fail your DMARC check need to be treated as suspicious, this could see some emails landing up on your spam folder.
  • Reject policy – p=reject. This policy is set up to reject all emails that do not pass your DMARC checks.

The ways these policies are set up is entirely up to your organisation and how you want to handle unauthenticated emails.

According to the 2019 Global DMARC Adoption Report, only 20.3% of domains are publishing some level of DMARC policy of that only 6.1% have a reject policy in place.

Why DMARC is important for your business?

At this point, you’re wondering if you really need DMARC if you already have SPF and DKIM.

The short answer is yes.

But there’s more…

As of 2019, there were over 3.9 billion email accounts, and when you consider that 94% of malware attacks occurred through email, it absolutely makes business sense to do your very best to protect your email.

While the corporate uptake of DMARC has been slow, it’s essential to note that digital giants such as Facebook and PayPal have adopted DMARC technology.

  • Reporting. The reporting offered with DMARC allows your organisation greater insights into your email channels. They will help your organisation monitor what emails are being sent and received by your organisation. DMARC reports will give you insights into how your domain is being used and can play a role in developing more robust email communications.
  • Enhanced control. DMARC allows you full control over what emails are being sent from your domain. If email abuse is taking place, you will immediately see it in the report allowing you to correct any authentication issues.

Key Takeaways

We’re living in an era where cyberattacks are every businesses reality.

By not securing your email effectively you are opening your business up to all kinds of vulnerabilities.

Don’t let yours be next.

 

 

Take a look at how PowerDMARC can help you secure your business email today.

Simply click the button below to speak to an email security expert today